Use of externally-controlled format string in ncurses (Alpine package)



Published: 2017-08-07
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-10685
CWE-ID CWE-134
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ncurses (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Use of externally-controlled format string

EUVDB-ID: #VU12190

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-10685

CWE-ID: CWE-134 - Use of Externally-Controlled Format String

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the fmt_entry function due to use of externally-controlled format string. A remote attacker can submit a specially crafted input and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ncurses (Alpine package): 6.0-r6 - 6.0-r7

External links

http://git.alpinelinux.org/aports/commit/?id=fb417d15ef66c5ecc1eb90b9377709b0bcbef75a
http://git.alpinelinux.org/aports/commit/?id=d5ed3d124d4bdd572b63974e635e5d7a2fd8a1c8
http://git.alpinelinux.org/aports/commit/?id=ac658c440bf2097da963820d14d5e89d75887cd7
http://git.alpinelinux.org/aports/commit/?id=bac940573393e980a46ef49d809df53058bba8b4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###